How To Exam?

a knowledge trading engine...


Deemed University 2009 A.M.I.E.T.E Electronics

Tuesday, 30 April 2013 02:45Web

g. When the useful bandwidth of transmission medium exceeds the needed bandwidth of signals to be transmitted the subsequent technique is used

(A) FDM (B) FDMA
(C) TDM (D) TDMA

h. If a station can determine whether a collision is taking place, then the amount of wasted bandwidth can be decreased by aborting the transmission when a collision is detected, this principle is used in

(A) CSMA-CA (B) CSMA-non persistent
(C) CSMA-CD (D) CSMA-n persistent

i. Examples of interior gateway protocols are

(A) IGMP and BGP (B) BGP and OSPF
(C) DVMRP and RIP (D) RIP and OSPF

j. The subsequent is application layer control protocol that can be used to establish, replace and terminate multimedia sessions or calls with one/more participants

(A) Session Announcement Protocol
(B) Session Initiation Protocol
(C) Session Description Protocol
(D) Session Conference Protocol


ans any 5 ques. out of 8 ques..
every ques. carries 16 marks.

Q.2 a. provide overview of TCP/IP architecture. Draw TCP/IP network architecture and TCP/IP protocol graph. (8)

b. discuss the subsequent application layer protocols:
(i) HTTP
(ii) PING (8)

Q.3 a. discuss the functionality of (8)
(i) Synchronous TDM
(ii) Statistical TDM

b. discuss the difference ranging from DSL and ADSL and their relevant features. (8)

Q.4 a. discuss the subsequent scheduling approaches used in Medium Access Control Protocols:
(i) Reservation Systems.
(ii) Polling.
(iii) Token Passing Ring (single token, multitoken) (9)

b. discuss different timers used in FDDI. (4)

c. provide the frame structure of IEEE 802.11. (3)

Q.5 a. Briefly discuss the different fields in IPv4 and IPv6 frame formats. (8)


b. discuss the subsequent routing protocols (8)
(i) RIP
(ii) OSPF


Q.6 a. discuss the BISDN reference model. (10)

b. discuss the subsequent parameters in HDLC:
(i) Configurations
(ii) Frame Format (6)

Q.7 a. discuss the design problems of a IP controlled internet. (7)

b. discuss any 3 Quality of Service (QoS) network performance parameters described in ATM standards. (9)

Q.8 a. discuss the subsequent Switching Techniques (8)
(i) Datagram approach
(ii) Virtual circuit approach

b. A routing algorithm should have global knowledge about the state of the network to perform its task. provide different goals and objective to be considered in routing algorithms. (8)

Q.9 a. discuss the subsequent kinds of attacks on network security:
(i) Passive Attack
(ii) Active Attack (8)

b. discuss RSVP along with the diagram of its architecture. (8)




( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER Deemed University 2009 A.M.I.E.T.E Electronics